Analysis
-
max time kernel
140s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
helper.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
helper.exe
Resource
win10v2004-20240802-en
General
-
Target
helper.exe
-
Size
1.8MB
-
MD5
c9f9eea209bb51ef39ca91e044a697a5
-
SHA1
3df695168bf8b2eaf91810ead2211a26933ea42e
-
SHA256
74f8b830970f32d17af19f10296ed6e38a7ddcf37d83543a90ddaaba5533bf12
-
SHA512
155a748d73c5fe988afbdd9fa9f5472bb338771fc4f8b1a708450211fe47bb1c10b5c106e987ee01a294c35a302a36f59233a20fb07a3986047f6e61578f8c92
-
SSDEEP
24576:6awwKusHwEwSDMn6Eeb5lbU7/cW29kdvDOq69IZao5nBnY71WK71QyE4BjLju:qwREDDMMbbocW2SdLOJ9IQo5hJWX/6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2880 helper.tmp -
Loads dropped DLL 1 IoCs
pid Process 2320 helper.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language helper.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language helper.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2880 helper.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2320 wrote to memory of 2880 2320 helper.exe 29 PID 2320 wrote to memory of 2880 2320 helper.exe 29 PID 2320 wrote to memory of 2880 2320 helper.exe 29 PID 2320 wrote to memory of 2880 2320 helper.exe 29 PID 2320 wrote to memory of 2880 2320 helper.exe 29 PID 2320 wrote to memory of 2880 2320 helper.exe 29 PID 2320 wrote to memory of 2880 2320 helper.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\helper.exe"C:\Users\Admin\AppData\Local\Temp\helper.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\is-6UFR9.tmp\helper.tmp"C:\Users\Admin\AppData\Local\Temp\is-6UFR9.tmp\helper.tmp" /SL5="$401B2,948902,919552,C:\Users\Admin\AppData\Local\Temp\helper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.3MB
MD5a15a06208b67487ac2eba3003ec9c8b8
SHA1c7bfda5c0bffaece26d21e31e01bbbfe6b4dcb57
SHA256b0aa7284cfca500d2f69dc0add1d5bdcc3f009190170c15f675d7642763a88af
SHA512ea260ad45a31ac2a735e317500ef1fad030fbfc2659beba114538b1ace1b1442b440c0cb991654bdd015a2fb5fc52d30159aa948c2e6d0f076c4cce9696b5a05